Identification or Verification? Advanced Identification Technology

Similar documents
Access Control Biometrics User Guide

Advanced Biometric Access Control Training Course # :

Tutorial 8. Jun Xu, Teaching Asistant March 30, COMP4134 Biometrics Authentication

Biometric Security Roles & Resources

Biometrics Our Past, Present, and Future Identity

RightPunch. PC-Based Biometric Time Clock. Key Facts: Seamless interface to Workforce Central, Workforce Ready & Workforce Dimensions (coming soon)

Verwelkoming. 20 September Fort Lent

CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018

Computer Security. 10. Biometric authentication. Paul Krzyzanowski. Rutgers University. Spring 2018

Computer Security 4/15/18

Congratulations! You just ordered IdentaMaster software package featuring Biometric login, File/Folder Encryption and Entire Drive Encryption.

A Novel Identification System Using Fusion of Score of Iris as a Biometrics

Keystroke Dynamics: Low Impact Biometric Verification

Global Mobile Biometric Authentication Market: Size, Trends & Forecasts ( ) October 2017

IRIS RECOGNITION-A BIOMETRIC TECHNOLOGY

NFC Identity and Access Control

Put Identity at the Heart of Security

Solution. Imagine... a New World of Authentication.

Biometrics problem or solution?

Smart Cards and Authentication. Jose Diaz Director, Technical and Strategic Business Development Thales Information Systems Security

Biometric Technology

IRIS recognition II. Eduard Bakštein,

UltraMatch. Standalone Iris Recognition System

AWARD TOP PERFORMER. Minex III FpVTE PFT II FRVT PRODUCT SHEET. Match on Card. Secure fingerprint verification directly on the card

FSN-PalmSecureID-for ATM Machines

icam7000s SERIES HARDWARE GUIDE Packing List CONTACTLESS CARD READER RECESS MOUNT (Optional) ISO/ANSI COMPLIANT EASY INSTALLATION What s in the Box

Combating Accuracy Issues in Biometric Solutions

IRIS recognition Eduard Bakštein,

International Journal of Informative & Futuristic Research ISSN:

Iris recognition: An emerging security environment for human identification

Biometric Cryptosystems: for User Authentication

Survey Guide: Businesses Should Begin Preparing for the Death of the Password

BioEnable Iris Recognition Solutions

User Authentication and Human Factors

AUTHENTICATION IN THE AGE OF ELECTRONIC TRANSACTIONS

A Review of Emerging Biometric Authentication Technologies

Distributed Systems. Smart Cards, Biometrics, & CAPTCHA. Paul Krzyzanowski

CIS 4360 Secure Computer Systems Biometrics (Something You Are)

Smart Mobile Identity. Revolutionizing biometric identity verification

Fujitsu World Tour 2016

INTUS 1600PS Palm Vein Authentication

ISO/IEC INTERNATIONAL STANDARD. Information technology Biometric data interchange formats Part 4: Finger image data

Large-scale AFIS and multi-biometric identification. MegaMatcher SDK

MSc-IT 1st semester Fall

MDR-1 Mobile Document Reader

Minutiae Based Fingerprint Authentication System

Human Identification Using Biometry

An Overview of Biometric Image Processing

Datasheet Fujitsu PalmSecure Contactless Biometrics Authentication

MorphoManager User Manual. Table of Contents

Discovering Computers Living in a Digital World

Brunswic. Welcome. Network video Surveillance. Biometric Identification (Face Detection) Biometric Identification (Finger Print)

Face recognition for enhanced security.

NIST Tests Supporting Biometric Identification Applications

Discovering Computers Chapter 5 Input. CSA 111 College of Applied Studies UOB

Authentication: Beyond Passwords

ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Biometric information protection

3D Face Project. Overview. Paul Welti. Sagem Défense Sécurité Technical coordinator. ! Background. ! Objectives. ! Workpackages

Encryption of Text Using Fingerprints

Palm Vein Technology

Discovering Computers Chapter 5 Input

Keywords Palmprint recognition, patterns, features

NeoFace Watch real-time face recognition How does it work? May 2018 Global Face Recognition Centre of Excellence NEC Europe

Smart Card and Biometrics Used for Secured Personal Identification System Development

Advances in Stand-off Biometrics

In this unit we are continuing our discussion of IT security measures.

Credentialing Technology & Biometrics

Introduction to Information & Communication Technologies

Biometrics: The Password You ll Never Forget

Implementation of Aadhaar Based EVM

EU Passport Specification

Role of Biometrics in Cybersecurity. Sam Youness

Advanced IRIS Segmentation and Detection System for Human Identification

Peg-Free Hand Geometry Verification System

Information Security Identification and authentication. Advanced User Authentication II

FUJITSU Security Solutions Protection of Valuable Data

PALM VEIN TECHNOLOGY

Enhanced Iris Recognition System an Integrated Approach to Person Identification

Introduction. Bio-LYNX can be customized according to the requirements of the customer.

Pegasus Equipments Export Limited. Local Contact:

SUPREMA LiveScan Solutions. June 2009

BIOMETRIC PRINTER SECURITY SYSTEM

TWIC Reader Technology Phase

Spatial Frequency Domain Methods for Face and Iris Recognition

Biometric identity verification for large-scale high-security apps. Face Verification SDK

Analysis of a Hand Geometry-Based Verification System

Company Profile. Consulting Architecture Realization Support. Designed by experts, applied by experts!

POLYBIO Multibiometrics Database: Contents, description and interfacing platform

Biometric Offender Movement

Using Biometric Authentication to Elevate Enterprise Security

Secure and Private Identification through Biometric Systems

Describe various types of pen input, and identify other types of input for smart phones

International Journal of Advance Engineering and Research Development. Iris Recognition and Automated Eye Tracking

Start Here. Quick Installation Guide. Verifi. IMPORTANT. Always install the Software prior to Hardware Installation ENTERPRISE

The Impact of Diffuse Illumination on Iris Recognition

BIOFLEX. Applications

Will Federated Cross Credentialing Solutions Accelerate Adoption of Smart Card Based Identity Solutions?

User Authentication. Tadayoshi Kohno

Distributed Systems. Smart Cards, Biometrics, & CAPTCHA. Paul Krzyzanowski

BioPassport TM Enterprise Server

Transcription:

Identification or Verification?

Basic Biometric Functions Verification Authenticating claimed identity, by comparing a presented image to a single, selected template. one to one Identification Determining the identity of a person by comparing a presented image to every enrolled template. one to many

All Biometrics follow a common Process Sequence Biometric Presentation Capture Process Feature Extraction Template Creation Template Storage

Generic Comparison of Biometric Technologies Cost Major Characteristics Typical Distance Typical False Reject Typical False Accept Template Size (Bytes) Application Typical Vendors Iris Mid => High Spread of Iris Pattern 10-14 0.01% 0.0000008% 512 High Security Iris ID, Aoptix, L1, SRI Fingerprint Mid Shape, position, and size Contact Required 1.0% 0.1% 1000 General Security Suprema, Aware, Morpho, AFIS Hand Readers Mid => High Size, length, width, thickness, and surface ratio Contact required 0.15% 0.1% 9 Low Security Cross Match, Cogent, Ingersol Rand Finger-Vein Mid Vein patterns in the finger Minimal contact 0.01% 0.0001% 512 Palm-Vein Mid Vein patterns in the palm 2 0.01% 0.00008% 0.8 General Security General Security M2SYS, Hitachi idlink, PalmSure, M2SYS Voice Recognition Mid Sound of Voice 1 3% 3% 1000 Telephone service Agnito, Smartmatic Facial Recognition Mid Position, size and/or shape of the eyes, nose, cheekbones, and jaw 10-60 2% 0.1% 60,000 Low Security Cross Match, L-1, Cognitec

Iris Works Where Other Biometrics Don t Iris on Smart Cards an ideal choice for less than optimal fingerprint environments. Rough work Dirty work A natural choice for Identification Credential Pristine prints difficult to acquire in environments where manual labor is prevalent. None of these very common conditions poses a problem for IrisAccess Hand Geometry Fingerprint Finger vein Face Recognition Fingerprint

The Biology Behind a Technology The donut shape of the eye except the black part(pupil) is the iris. Iris recognition technology is different from the retina scan. It is same as taking pictures using normal digital camera - no worry about eye safety. Iris Sclera Choroid Aqueous Humor Retina Cornea Optic Nerve Iris Ciliary Muscle Lens Retina

Most Accurate Statistical probability of iris achieving a false accept is 1 in 1.2 million. Examines more than 240 of the 400 measurable variables (degrees of freedom) in the human eye. Uniqueness = Accuracy The probability of two individuals having the same iris pattern is 1 in 10 78 Twins have same DNA but different iris patterns Right and left eye are totally different Stable for life after age 1 Flakes falling on Earth in one year = 10 23 Est. probability of two like irides = 10 78

Anatomy of the Iris Collarettes Ciliary Area Pupilary Area Pupil Radial furrows Pigment Frill Crypts

Key Differentiator Iris Recognition surpasses all other biometric technologies because Iris Recognition identifies

How does Iris Recognition work? 4 easy steps...

Step 1. Video image of iris is acquired Limbus and pupillary boundaries, and center zones of analysis are established Pupil dilation or contraction is accounted for Eye lashes and reflected light (specularities) in the iris area are ignored Image is adjusted for tilt

Step 2. Iris features are digitized into a 512-byte IrisCode (256 for features, 256 for control)

Step 3. During Recognition, this IrisCode record is compared to all IrisCode records in the database

Step 4. The software makes the decision: Accepted or Rejected?

Variance Analysis IrisCode generated from the presented iris 1 1 0 0 IrisCodes in Database 0 1 0 1 Result 1 0 0 1 (2048 bits) (2048 bits) HD = n / 2048 Hamming Distance (HD) = The Hamming distance refers to the amount of variance between the IrisCode generated from the presented iris, and an IrisCode from the database.

How It Works Statistical decision based on HD: Impostor or Authentic In general, if greater than 68% bits match = authentic less than 68% bits match = impostor (greater than 68% = HD < 0.32) (less than 68% = HD > 0.32)

Accept / Reject Analysis AUTHENTICS IMPOSTORS (accept) (reject) Qty of Samples.08.34.4999 Hamming Distance (HD) The result of comparing over 234,00 Iriscode records

NPL UK Test Results

Gaining Acceptance Worldwide 1 of 2 (commercial market) This is a partial list, for representation only Asset Protection Data Center Security Lab Security & Bio Hazard Containment Infrastructure Protection Workforce Management Hotels Clubs POS & Retails

Gaining Acceptance Worldwide 2 of 2 (government market) This is a partial list, for representation only Transportation Security Government & Public Safety Civil Identity India Government of Andhra Pradesh Kingdom of Jordan Vietnam Multi-stage Governmen t ID State of Qatar Sultanate of Oman Kingdom of Saudi Arabia

Entry Access Control System World Trade Center New York World Trade Center Construction Site Access Control All construction teams are currently enrolled with Iris ID technology IrisAccess deployed since 2009 Total Number Employees 4000 Integrated with DESFire cards and Lenel Access Control IrisAccess secures access to the perimeter of WTC

Data Center Security Cobalt Data Center Apple Data Center io Data Center Google Data Center

Entry Access Control System CERN European Organization for Nuclear Research (CERN) Access Control CERN - European Organization for Nuclear Research Enterprise Access Control Application Protecting 10,000 plus researchers from multiple countries Deployed on 40 access shafts protecting particle accelerators and detectors IrisAccess deployed since 2007

Transportation Security CATSA Canada: 29 Airport Deployment 29 airports in Canada deployed 180,000-200,000 employees participated Employees carry their iris template on a secure smart card Integration with existing airport security systems (16 locations)

Recent Introductory Statement From Research&Markets.org Relatively young in the biometric identification market with commercial availability only since 1995, iris biometrics, thanks to its swift results, low failure to error rates and high accuracy levels, is however fast proving to be a preferred choice of biometric identification in a range of applications.

icam7000 Series Multifactor Biometric Reader Easy Installation Accurate, Secure, Fast, Easy to Use Integrated Contactless Smart Card Reader Fully Automatic Dual Iris Capture Time and Attendance Ready Highly Scalable Solution ISO 19794-6 (iris) & ISO 19794-5 (face) compliant

TD100 Iris and Face Camera Single Motion Auto Capture Dual Iris Enrollment & Recognition OLED Touch Screen Face capture ISO Standard Compliant

icam H100 Iris + Face + Finger Single Motion Auto Capture Dual Iris Enrollment & Recognition OLED Touch Screen High Capacity on Device Matching ISO Standard Compliant Lightweight (~15 oz) WiFi - GPS AudioVideo USB Smart Card Ready - SD Memory Hot Swap Battery

Thank you.